Home > Research > Publications & Outputs > Using a Spatial Context Authentication Proxy fo...

Electronic data

View graph of relations

Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. / Mayrhofer, Rene; Gostner, Roswitha.
In: Journal of Mobile Multimedia, Vol. 3, No. 3, 09.2007, p. 198-217.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Mayrhofer, R & Gostner, R 2007, 'Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections', Journal of Mobile Multimedia, vol. 3, no. 3, pp. 198-217.

APA

Mayrhofer, R., & Gostner, R. (2007). Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. Journal of Mobile Multimedia, 3(3), 198-217.

Vancouver

Mayrhofer R, Gostner R. Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. Journal of Mobile Multimedia. 2007 Sept;3(3):198-217.

Author

Mayrhofer, Rene ; Gostner, Roswitha. / Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. In: Journal of Mobile Multimedia. 2007 ; Vol. 3, No. 3. pp. 198-217.

Bibtex

@article{5a579a96c241401397d18f93600ef06c,
title = "Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections",
abstract = "Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is difficult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated cannot experience the same context and thus cannot benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other by shared context. This concept is applicable to a wide range of application scenarios, context sensing technologies, and trust models. We show its practicality in an implementation for setting up IPSec connections based on spatial reference. Our specific scenario is ad-hoc access of mobile devices to secure 802.11 WLANs using a mobile device as authentication proxy. A user study shows that our method and implementation are intuitive to use and compare favourably to a standard, password-based approach.",
keywords = "cs_eprint_id, 1549 cs_uid, 382",
author = "Rene Mayrhofer and Roswitha Gostner",
year = "2007",
month = sep,
language = "English",
volume = "3",
pages = "198--217",
journal = "Journal of Mobile Multimedia",
publisher = "Rinton Press Inc.",
number = "3",

}

RIS

TY - JOUR

T1 - Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections

AU - Mayrhofer, Rene

AU - Gostner, Roswitha

PY - 2007/9

Y1 - 2007/9

N2 - Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is difficult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated cannot experience the same context and thus cannot benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other by shared context. This concept is applicable to a wide range of application scenarios, context sensing technologies, and trust models. We show its practicality in an implementation for setting up IPSec connections based on spatial reference. Our specific scenario is ad-hoc access of mobile devices to secure 802.11 WLANs using a mobile device as authentication proxy. A user study shows that our method and implementation are intuitive to use and compare favourably to a standard, password-based approach.

AB - Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is difficult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated cannot experience the same context and thus cannot benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other by shared context. This concept is applicable to a wide range of application scenarios, context sensing technologies, and trust models. We show its practicality in an implementation for setting up IPSec connections based on spatial reference. Our specific scenario is ad-hoc access of mobile devices to secure 802.11 WLANs using a mobile device as authentication proxy. A user study shows that our method and implementation are intuitive to use and compare favourably to a standard, password-based approach.

KW - cs_eprint_id

KW - 1549 cs_uid

KW - 382

M3 - Journal article

VL - 3

SP - 198

EP - 217

JO - Journal of Mobile Multimedia

JF - Journal of Mobile Multimedia

IS - 3

ER -